{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:50:56Z","timestamp":1725605456703},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642241772"},{"type":"electronic","value":"9783642241789"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24178-9_2","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T10:49:45Z","timestamp":1315392585000},"page":"14-27","source":"Crossref","is-referenced-by-count":3,"title":["Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes"],"prefix":"10.1007","author":[{"given":"Antonino","family":"Simone","sequence":"first","affiliation":[]},{"given":"Boris","family":"\u0160kori\u0107","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Amiri, E., Tardos, G.: High rate fingerprinting codes and the fingerprinting capacity. In: SODA 2009, pp. 336\u2013345 (2009)","DOI":"10.1137\/1.9781611973068.38"},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10623-008-9200-z","volume":"48","author":"O. Blayer","year":"2008","unstructured":"Blayer, O., Tassa, T.: Improved versions of Tardos\u2019 fingerprinting scheme. Designs, Codes and Cryptography\u00a048(1), 79\u2013103 (2008)","journal-title":"Designs, Codes and Cryptography"},{"issue":"5","key":"2_CR3","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-540-88961-8_24","volume-title":"Information Hiding","author":"T. Furon","year":"2008","unstructured":"Furon, T., Guyader, A., C\u00e9rou, F.: On the design and optimization of tardos probabilistic fingerprinting codes. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol.\u00a05284, pp. 341\u2013356. Springer, Heidelberg (2008)"},{"key":"2_CR5","first-page":"231","volume":"1","author":"S. He","year":"2006","unstructured":"He, S., Wu, M.: Joint coding and embedding techniques for multimedia fingerprinting. TIFS\u00a01, 231\u2013248 (2006)","journal-title":"TIFS"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Huang, Y.W., Moulin, P.: Saddle-point solution of the fingerprinting capacity game under the marking assumption. In: ISIT 2009 (2009)","DOI":"10.1109\/ISIT.2009.5205882"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Moulin, P.: Universal fingerprinting: Capacity and random-coding exponents. Preprint arXiv:0801.3837v2 (2008)","DOI":"10.1109\/ISIT.2008.4594980"},{"key":"2_CR8","unstructured":"Nuida, K., Hagiwara, M., Watanabe, H., Imai, H.: Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature. CoRR, abs\/cs\/0610036 (2006)"},{"issue":"5-6","key":"2_CR9","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s00530-007-0096-7","volume":"13","author":"H.G. Schaathun","year":"2008","unstructured":"Schaathun, H.G.: On error-correcting fingerprinting codes for use with watermarking. Multimedia Systems\u00a013(5-6), 331\u2013344 (2008)","journal-title":"Multimedia Systems"},{"key":"2_CR10","unstructured":"Simone, A., \u0160kori\u0107, B.: Accusation probabilities in Tardos codes. In: Benelux Workshop on Information and System Security, WISSEC 2010 (2010), http:\/\/eprint.iacr.org\/2010\/472"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1109\/TIT.2004.842702","volume":"51","author":"A. Somekh-Baruch","year":"2005","unstructured":"Somekh-Baruch, A., Merhav, N.: On the capacity game of private fingerprinting systems under collusion attacks. IEEE Trans. Inform. Theory\u00a051, 884\u2013899 (2005)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC 2003, pp. 116\u2013125 (2003)","DOI":"10.1145\/780542.780561"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10623-007-9142-x","volume":"46","author":"B. \u0160kori\u0107","year":"2008","unstructured":"\u0160kori\u0107, B., Katzenbeisser, S., Celik, M.U.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Designs, Codes and Cryptography\u00a046(2), 137\u2013166 (2008)","journal-title":"Designs, Codes and Cryptography"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107, B., Katzenbeisser, S., Schaathun, H.G., Celik, M.U.: Tardos fingerprinting codes in the combined digit model. In: IEEE Workshop on Information Forensics and Security (WIFS) 2009, pp. 41\u201345 (2009)","DOI":"10.1109\/WIFS.2009.5386485"},{"issue":"8","key":"2_CR15","doi-asserted-by":"publisher","first-page":"3663","DOI":"10.1109\/TIT.2008.926307","volume":"54","author":"B. \u0160kori\u0107","year":"2008","unstructured":"\u0160kori\u0107, B., Vladimirova, T.U., Celik, M.U., Talstra, J.C.: Tardos fingerprinting is better than we thought. IEEE Trans. on Inf. Theory\u00a054(8), 3663\u20133676 (2008)","journal-title":"IEEE Trans. on Inf. Theory"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Xie, F., Furon, T., Fontaine, C.: On-off keying modulation and Tardos fingerprinting. In: MM&Sec 2008, pp. 101\u2013106 (2008)","DOI":"10.1145\/1411328.1411347"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24178-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T22:48:52Z","timestamp":1560552532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24178-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642241772","9783642241789"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24178-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}